-
1
-
-
42649121690
-
Security in vehicular Ad Hoc networks
-
X. Lin et al., "Security in Vehicular Ad Hoc Networks," IEEE Comm., vol. 46, no. 4, 2008, pp. 88-95.
-
(2008)
IEEE Comm.
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
-
2
-
-
80052382129
-
Efficient data propagation in traffic monitoring vehicular networks
-
A. Skordylis and N. Trigoni, "Efficient Data Propagation in Traffic Monitoring Vehicular Networks," IEEE Trans. Intelligent Transportation Systems, vol. 12, no. 3, 2011, pp. 680-694.
-
(2011)
IEEE Trans. Intelligent Transportation Systems
, vol.12
, Issue.3
, pp. 680-694
-
-
Skordylis, A.1
Trigoni, N.2
-
3
-
-
84856175842
-
ECCP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
R. Lu et al., "ECCP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," Proc. 27th Conf. Computer Comm., IEEE, 2008, pp. 1229-1237.
-
(2008)
Proc. 27th Conf. Computer Comm. IEEE
, pp. 1229-1237
-
-
Lu, R.1
-
4
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin et al., "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 56, no. 6, 2007, pp. 3442-3456. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
5
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, vol. 15, no. 1, 2007, pp. 39-68. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
6
-
-
70350686304
-
Design and analysis of a lightweight certificate revocation mechanism for vanet
-
ACM
-
J.J. Haas, Y.-C. Hu, and K.P. Laberteaux, "Design and Analysis of a Lightweight Certificate Revocation Mechanism for Vanet," Proc. Vehicular Ad Hoc Networks, ACM, 2009, pp. 89-98.
-
(2009)
Proc. Vehicular Ad Hoc Networks
, pp. 89-98
-
-
Haas, J.J.1
Hu, Y.-C.2
Laberteaux, K.P.3
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," Advances in Cryptology, LNCS 2139, Springer, 2001, pp. 213-229.
-
(2001)
Advances in Cryptology, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Springer
-
P.S.L.M. Barreto et al., "Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps," Advances in Cryptology, LNCS 3788, Springer, 2005, pp. 515-532.
-
(2005)
Advances in Cryptology, LNCS
, vol.3788
, pp. 515-515
-
-
Barreto, P.S.L.M.1
-
9
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
R. Lu et al., "Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in Vanets," IEEE Trans. Vehicular Technology, vol. 61, no. 1, 2012, pp. 86-96.
-
(2012)
IEEE Trans. Vehicular Technology
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
|